Watermarking Techniques for Protecting Intellectual Properties in aDigital Environment


  • T. K. Aroge Department of Computer Science and Information Technology, University of Science and Technology, Ifaki-Ekiti, Ekiti-State, Nigeria
  • F. O. Isinkaye Department of Computer Science and Information Technology, University of Science and Technology, Ifaki-Ekiti, Ekiti-State, Nigeria


Watermarking techniques, Digital properties, Content protection, Authenticity determination, Quantization


The protection and enforcement of intellectual property rights for digital media has become an important issue in many countries of the world. There is increase in the popularity and accessibility of the Internet to record, edit, replicate and broadcast multimedia content which has necessitated a high demand to protect digital information against illegal uses, manipulations and distributions. Digital watermarking technique which is the process used to embed proprietary information into multimedia digital signal provides a robust solution to this problem. This paper reviews different aspects and techniques of digital watermarking for protecting digital contents. It also explores different application areas of digital watermarking such as copyright protection, broadcast monitoring, integrity protection etc.


Download data is not yet available.


[1] R.B. Wolfgang, C. I. Podilchuk, and E. J. Delp, "Perceptual Watermarks for digital images," Proc. IEEE, No 7, 1999, pp. 1108-1126.
[2] V. Potdar, S. Han and E. Chang, "A survey of Digital Image Watermarking Techniques", Proc. of the 3rd
International IEEE Conference on Industrial Informatics. IEEE Xplore Press, USA, 2005, pp. 709-716.
[3] A. Lemma, J. Aprea and L. Kherkhof, "A Temporal-Domain Audio Watermarking Technique", IEEE Trans. Signal Process, Vol 51, 2003, pp 1088-1097.
[4] J. Ingermar Cox, L. Matthew Miller, and A. Jerey Bloom, Digital watermarking, Morgan Kaufmann Publishers, Inc., San Francisco, 2001
[5] S. Katzenbeisser, A.P. Fabien Peticolas, "Information Hiding Techniques for and Digital Watermarking", Security Technology for World Wide Web, Artech House Computer Security Series, 2000.
[6] G. Caronni,"Assuming Ownership rights for digital images", Proc of Reliable IT systems, 1995, pp 251-263.
[7] Q. Sun, S. Chang, "Semi-fragile image Authentication Using Generic Wavelet Domain Features and ecc," Proc of IEEE International Conference on Image Processing, 2002, pp. 901-904.
[8] N. Nicholaisdis, I. Pitas, "Robust Image Watermarking in the Spatial Domain", Signal Processing, vol.66 No 3, 1998, pp. 385-403.
[9] T. Kalker, "Considerations on Watermarking Security", Proc. MMSP, Cannes, France, Oct. 2001, pp. 201-206.
[10] F. M. Boland, J. J. K. O´Ruanaidh, and C. Dautzenberg, "Watermarking Digital Images for Copyright Protection", In IEEE Int. Conf. Image Processing and Applications. 1995, pp. 321-326.
[11] I. Cox, J. Killian, T. Leighton, and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia", IEEE Trans. Image Processing, Vol.6, 1997, pp. 1673-1687.
[12] J. Huang, Y. Shi, "Embedding Image Watermarking in DC Components", IEEE Trans. CSVT Vol.10 No 6, 2000, pp. 974-979.
[13] N. F Johnson, S. C. Katzenbeisser, "A survey of Steganographic Techniques", In Information Techniques for Steganography and Digital Watermarking, S. C. Katzenbeisser et al., Ed. Northwood, MA: Artech House,
Dec. 1999, pp. 43-75.
[14] W. Bender, D. Gruhl, and N.Morimoto, "Techniques for Data Hiding", IBM Syst. Journal, Vol.35, Nos 3-4, 1996, pp. 313-336
[15] I. B Ismail, I. R. Farah and M. B. Ahmed, "Satellite Watermarking based on Wavelet Techniques", IEEE 2nd International Conference on Information and Communication Technologies ICTTA '06 SYNA, 2006.
[16]L. Boney, A. Tewfik, and K. Hamdy, "Digital Watermark for Audio Signals", IEEE Proc. Multimedia, 1996, pp 473-480.
[17] M. Swanson, B. Zhu, A, Tewfik and L. Boney, "Robust Audio Watermarking using Perceptual Masking", Signal Process; Special Issue on watermarking, 1997, pp. 337-355.
[18] J. Seok, J. Hong, and J. Kim, "A Novel Audio Watermarking Algorithm for Copyright Protection of Digital Audio", ETRI Journal, Vol.24, 2002, pp. 181- 189.
[19] S. Guan-Ming, "An Overview of Transparent and Robust Digital Image Watermarking", Available online at www.watermarkingworld.orgLWMMLArchive/0504/pdf00000.pdf
[20] L. Qiao, K. Nahrstedt, "Watermarking Schemes and Protocols For Protecting Rightful Ownership and Customer's Rights", Journal of Visual Communication and Image Representation Vol. 9, 1998, pp.194-210.
[21] R. Shah, A. Argawal, and S. Ganesan, "Frequency Domain Real Time Digital Watermarking", in Proc. of the IEEE 2005 Int. Conf. on Elector Info. Tech, 2005, pp. 1-6.
[22] A. Micic, D. Radenkovic, and S. Nikolic, "Autentification of Text Document Using Digital Watermarking", Telecommunication in Modern Satellite, Cable and Broadcasting Services, 2005, 7 th International Conference, Vol. 2. 2005, pp. 503-505.
[23] J. T. Brassil, S. Low, N.F Maxemchuk, L. O'Gorman, "Electronic Marking and Identification Techniques to
Discourage Document Copying", Selected Area in Communications, IEEE Journal on Vol. 13, No 8, Oct. 1995, pp. 1495-1504.
[24] M. Arnold, M. Schumucker and S. Wolthusen, "Techniques and Applications of Digital Watermarking and Content Protection", Artech House, Boston, MA. ISBN:10:1580531113, 2003, pp. 274.
[25] I. Pitas, "A method for Signature Casting in Digital Images", Proc. IEEE Int. Conf on Image Processing, 1996, pp. 215-473.
[26] F. Hartung, M. Kutter, "Multimedia Watermarking Techniques ", 4 Proceeding of the IEEE, Vol. 87 No 7, 1999, pp.1079-1107.




How to Cite

Aroge, T. K., & Isinkaye, F. O. (2012). Watermarking Techniques for Protecting Intellectual Properties in aDigital Environment. Journal of Computer Science and Technology, 12(01), p. 27–31. Retrieved from https://journal.info.unlp.edu.ar/JCST/article/view/664



Original Articles